Android / Security

Mitigating Android Social Engineering Attacks

How to patch the user vulnerability if Android can’t do it?

Denis Crăciunescu
ProAndroidDev
Published in
14 min readAug 3, 2020

--

Series outline:

In the first part of the series, we have identified that the user is the primary vulnerability exploited by attackers.

Subsequently, in the second part, we have seen the security measures enforced by Android at the OS level and the application level. This enabled us to better understand why the operating system itself is a harder target than the user.

However, so far, we have explored only the problem.

But what is the solution?

We will take up where we left off in the last part — user security.

User Security

Source: Ed Pylypenko via Unsplash

We have already seen the multitude of mechanisms enforced by Android to ensure the overall security of the system.

However, the user is still the decisive factor when it comes to the successful execution of a malicious action.

Let’s first understand a social engineering attack before seeing how we can protect against it.

Social Engineering

Source: Austin Distel via Unsplash

Social engineering (SE) is the term used for malicious attacks that involve human interaction. It uses psychological manipulation to trick users into giving sensitive details or commit security mistakes.

Even if the team at Android implemented the most complete security solution, it wouldn’t be enough to defend gullible users against SE attacks.

--

--